ServiceRouteEx
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
63acbf6ea9cd2caa9ca549208c68c41b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63acbf6ea9cd2caa9ca549208c68c41b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
63acbf6ea9cd2caa9ca549208c68c41b_JaffaCakes118
Size
19KB
MD5
63acbf6ea9cd2caa9ca549208c68c41b
SHA1
eda86622a5915e55a7d776b93eaae2e9ced9cbc1
SHA256
3b305d0a2a2541d516fb36aac6eab88badf14c39708e0bc8d4fa44a0fd82ba2a
SHA512
76c5611da0b68e0f0521d8369f261621f059739c7d7f7a7f52c6e3d71079364f7521d62ddec26d44e5afe1d87a995172e6f667549d6d43dbe6c7d0c17d3734a1
SSDEEP
192:rxGJa1CqcrANnY/dZ7JQfuMCSWVMuBBQ6PRQkIU8jXDMcDdsZ:5CfB/TafWSWVMuBBQARQkIHMsds
Checks for missing Authenticode signature.
resource |
---|
63acbf6ea9cd2caa9ca549208c68c41b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strlen
RtlZeroMemory
strcpy
memcmp
memcpy
VirtualProtectEx
LoadLibraryA
GetProcAddress
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
CloseHandle
CreateFileA
CreateThread
GetCurrentProcess
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GlobalAlloc
GlobalFree
ReadFile
ReadProcessMemory
Sleep
TerminateProcess
VirtualAlloc
VirtualFree
WriteProcessMemory
VirtualQueryEx
GetWindowThreadProcessId
KillTimer
SetTimer
SetWindowLongA
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowLongA
GetWindowTextA
EnumWindows
wsprintfA
CallNextHookEx
CallWindowProcA
send
gethostname
ServiceRouteEx
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ